Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic
Skip to Results

Search Results

You searched for: wireless sensor networks
60,212 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Mobile Network Supported Wireless Sensor Network Services

    Krco, S. ; Tsiatsis, V. ; Matusikova, K. ; Johansson, M. ; Cubic, I. ; Glitho, R.
    Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE International Conference on

    DOI: 10.1109/MOBHOC.2007.4428690
    Publication Year: 2007 , Page(s): 1 - 3
    Cited by:  Papers (2)

    IEEE Conference Publications

    Wireless sensor networking research has been mainly focused on internal wireless sensor network issues such as MAC and routing protocols, energy saving, HW design and to some extent on the architecture of gateways that connect a wireless sensor network with the rest of the world. Wireless sensor networks have been seen as dedicated to one task by one owner. On the other hand, our research is focused on integration of wireless sensor networks into existing networks, primarily mobile ones, and provision of sensor based and/or enhanced services to remote users. Therefore, we have been working on designing an architecture that utilizes the existing infrastructure to interconnect independent wireless sensor networks and to provide data aggregation and actuator control services. In the proposed architecture, sensor networks (small or large, deployed for any purpose and by anyone) represented by their gateways are treated as leaf nodes hanging off a mobile or fixed network that use these networks to interact with remote and local users. Each gateway exposes the capabilities of its sensors, actuators and the sensor network as a whole. This information is used by sensor services middleware to query/command sensor ecosystems on behalf of applications and remote users interested in sensor measurements or actuator control. The details of the interaction between the gateways and its sensors/actuators are of no interest to the remote users. Further, we consider the whole wireless sensor networking landscape as an open market where the underlying mobile and fixed networks facilitate the interaction between the sensor networks and the consumers of the information they produce. Each sensor network is first of all a sensor information provider that offers specific sensor information defined by the type of available sensors and their spatial and temporal conditions to the interested users. Secondly, each sensor network provides actuation services that may potentially affect the inform- ation gathered by its sensors. Obviously, in such an environment, where many mobile users are acting as tiny information providers, service discovery, service composition, service provisioning and service authorization are very challenging problems. These problems are addressed in the proposed architecture by introducing a middle layer that aggregates information from all small information providers and provides higher level services to the end users. This layer provides the means to quickly add or remove sensors, actuators, sensor networks, sensor network providers, to modify and enhance the existing or add completely new services utilizing the underlying infrastructure. It could be thought of as a "plug-and-play" functionality for: (a) interconnecting different existing sensor networks; (b) adding new sensor networks which facilitate the expansion of the entire system; and (c) expanding the capability of individual sensor networks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Security topology in wireless sensor networks with routing optimisation

    Ismail, M. ; Sanavullah, M.Y.
    Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference on

    DOI: 10.1109/WCSN.2008.4772673
    Publication Year: 2008 , Page(s): 7 - 15
    Cited by:  Papers (2)

    IEEE Conference Publications

    Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordi- nate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty. View full abstract»

  • Freely Available from IEEE

    Industrial Wireless Sensor Networks: Applications, Protocols, and Standards [Book News]

    Silva, F.
    Industrial Electronics Magazine, IEEE

    Volume: 8 , Issue: 4
    DOI: 10.1109/MIE.2014.2361239
    Publication Year: 2014 , Page(s): 67 - 68

    IEEE Journals & Magazines

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A TOSSIM based implementation and analysis of collection tree protocol in wireless sensor networks

    Nath, R.
    Communications and Signal Processing (ICCSP), 2013 International Conference on

    DOI: 10.1109/iccsp.2013.6577101
    Publication Year: 2013 , Page(s): 484 - 488

    IEEE Conference Publications

    Wireless sensor networks has been a thrust area of research in recent years. Among the various topics in wireless sensor networks, data collection has been an important area of research. Many wireless sensor networks generally depend on some collection oriented service to route data packets from source to the sink. Various protocols have been devised regarding data collection in wireless sensor networks among which the collection tree protocol is an important one. TinyOS is an operating system specifically designed for wireless sensor networks. Since sensor networks are constrained in power consumption point of view, this operating system provides an excellent platform for development of various applications in wireless sensor networks keeping in mind the limitations of the sensor devices. Sensor networks are sometimes set up in remote locations and testing of applications in those environments becomes troublesome. Thus to facilitate the entire evaluation of the protocol a simulation of the network can be done. This paper deals with the TOSSIM (TinyOS Simulator) based approach towards simulation of collection tree protocol in wireless sensor networks and the analysis of the performance of the protocol considering various scenarios. TOSSIM or TinyOS Simulator is a well known simulator that can be used to simulate an entire TinyOS application. This paper also carries out an analysis that will provide a glimpse regarding the performance of collection tree protocol and at the same time will give an insight on how TOSSIM can be used as a simulation platform for implementation of collection tree protocol. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    An efficient approach for sensor deployments in wireless sensor network

    Akshay, N. ; Kumar, M.P. ; Harish, B. ; Dhanorkar, S.
    Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference on

    DOI: 10.1109/INTERACT.2010.5706178
    Publication Year: 2010 , Page(s): 350 - 355
    Cited by:  Papers (8)

    IEEE Conference Publications

    In wireless sensor networks, the number of sensor nodes has direct relation to the cost of total wireless sensor networks, and at the same time, the problem is closely connected to wireless sensor networks' performance, such as robust, fault-tolerance, and furthermore, it is considered at first as wireless sensor networks are designed. Therefore, the research on the number of sensor nodes has significant meanings of theory and practice to design of wireless sensor networks. By computation and analysis, the sensor deployments in the form of equilateral triangle, as a rule, are better than those in the form of square, and the efficient coverage area ratios decrease with increasing number of sensor nodes. Sometime information is incompletely monitored or undetected. This is coverage and connectivity problems. The coverage problem is also one of basic problem in wireless sensor networks. The paper analyzes several sensor deployments and computes their efficient coverage areas and their efficient coverage area ratios. In addition, the relation between the number of sensors and efficient coverage area ratio is discussed. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Exploring hierarchy architecture for wireless sensor networks management

    Shangwei Duan ; Xiaobu Yuan
    Wireless and Optical Communications Networks, 2006 IFIP International Conference on

    DOI: 10.1109/WOCN.2006.1666538
    Publication Year: 2006 , Page(s): 6 pp. - 6
    Cited by:  Papers (4)

    IEEE Conference Publications

    Large-scale wireless sensor networks are composed of hundreds or thousands of autonomous sensor nodes. How to manage wireless sensor networks effectively is a big challenge. This paper presents a hierarchical management architecture for wireless sensor networks. In contrast to previous management architecture on wired networks and wireless ad-hoc networks, this architecture is based on wireless sensor networks' two distinct features: centralization and task orientation. Based on such architecture, the paper also develops a lightweight, task-oriented clustering algorithm to reduce the granularity of wireless sensor networks. The simulation demonstrates its effectiveness in wireless sensor network based on energy analysis View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks

    Xiaofeng Han ; Xiang Cao ; Lloyd, E.L. ; Chien-Chung Shen
    Mobile Computing, IEEE Transactions on

    Volume: 9 , Issue: 5
    DOI: 10.1109/TMC.2009.161
    Publication Year: 2010 , Page(s): 643 - 656
    Cited by:  Papers (21)

    IEEE Journals & Magazines

    Existing work on placing additional relay nodes in wireless sensor networks to improve network connectivity typically assumes homogeneous wireless sensor nodes with an identical transmission radius. In contrast, this paper addresses the problem of deploying relay nodes to provide fault tolerance with higher network connectivity in heterogeneous wireless sensor networks, where sensor nodes possess different transmission radii. Depending on the level of desired fault tolerance, such problems can be categorized as: 1) full fault-tolerant relay node placement, which aims to deploy a minimum number of relay nodes to establish k(k ? 1) vertexdisjoint paths between every pair of sensor and/or relay nodes and 2) partial fault-tolerant relay node placement, which aims to deploy a minimum number of relay nodes to establish k(k ? 1) vertex-disjoint paths only between every pair of sensor nodes. Due to the different transmission radii of sensor nodes, these problems are further complicated by the existence of two different kinds of communication paths in heterogeneous wireless sensor networks, namely, two-way paths, along which wireless communications exist in both directions; and one-way paths, along which wireless communications exist in only one direction. Assuming that sensor nodes have different transmission radii, while relay nodes use the same transmission radius, this paper comprehensively analyzes the range of problems introduced by the different levels of fault tolerance (full or partial) coupled with the different types of path (one-way or two-way). Since each of these problems is NP-hard, we develop O(?k2)-approximation algorithms for both one-way and two-way partial fault-tolerant relay node placement, as well as O(?k3)-approximation algorithms for both one-way and two-way full fault-tolerant relay node placement (? is the best performance ratio of existing approximation algorithms for finding a minimum k-vertex connected spanning graph). To f- - acilitate the applications in higher dimensions, we also extend these algorithms and derive their performance ratios in d-dimensional heterogeneous wireless sensor networks (d ? 3). Finally, heuristic implementations of these algorithms are evaluated via QualNet simulations. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on Clustering Routing Algorithms in Wireless Sensor Networks

    Qing Bian ; Yan Zhang ; Yanjuan Zhao
    Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on

    Volume: 2
    DOI: 10.1109/ICICTA.2010.343
    Publication Year: 2010 , Page(s): 1110 - 1113
    Cited by:  Papers (4)

    IEEE Conference Publications

    Compared with the traditional wireless networks, wireless sensor networks have energy constraints, low-data-rate of high redundant and data flow of high-to-one, and so on. Energy effectiveness is the key performance indicators of wireless sensor networks. Based on the analysis of energy management strategy in the wireless sensor networks, the main factors affecting energy consumption are: perceptual data, data processing and radio communications, the radio communication is the main part of energy consumption. In the wireless sensor networks, the realization of energy-efficiency could be improved while in the different layers of communication protocol stack. However, as the basis of the limitations of the physical layer, the improvement is focus on design and implementation of network-layer protocol. The researchers agreed that the clustering of nodes in wireless sensor networks is an effective program of energy conservation. This article dedicated to research the clustering routing algorithm in wireless sensor networks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The Model — Dynamic and Flexible Intrusion Detection Protocol for high error rate Wireless Sensor Networks based on data flow

    Janakiraman, S. ; Rajasoundaran, S. ; Narayanasamy, P.
    Computing, Communication and Applications (ICCCA), 2012 International Conference on

    DOI: 10.1109/ICCCA.2012.6179178
    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)

    IEEE Conference Publications

    Wireless Sensor Networks (WSNs) are the collection of self - organizing sensor nodes deployed in various physical environments statically or dynamically depends upon the application. In wireless environment these sensor nodes are defenseless or vulnerable against attacks. To solve this problem the Intrusion Detection System (IDS) has been used and for wireless networks, Distributed Intrusion Detection System (DIDS) has been used. But this is not sufficient to achieve maximum resiliency against attacks. Considering the issues here a new Dynamic Intrusion Detection Protocol model (DYDOG) has been designed based on data flow for High Error Rate Wireless Sensor Networks (WSNs). Here the Dynamic Intrusion Detection nodes are deployed based on the proposed protocol model which will acts as forwarding node as well as Intrusion Monitoring Node with respect to the data flow through the sensor nodes. The Dynamic Intrusion Detection Nodes are selected from the one-hop or two hop neighbor's non-forwarding node list by using Secure Session Key Management approach without deploying separate Intrusion Monitoring Nodes. This makes the network is more flexible and dynamic against various attacks and provide maximum monitoring node's availability with better resiliency in high error rate Wireless Sensor Networks (WSNs). The monitoring nodes are dynamically changed in its behavior within the session itself depends on mobility and based on proposed conditions. For an attacker it will create problem to identify and attack the Dynamic Intrusion Detection Nodes within the limited session. By this protocol the attacks and compromised nodes can be effectively identified at runtime in high data rate static or dynamic Wireless Sensor Networks (WSNs). Now the research is going on On-Line Updates for local agents and global agents individually in high data rate Wireless Sensor Networks (WSNs), when the network has maximum mobility and maximum data rate. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Overview of Security Issues in Wireless Sensor Networks

    Modares, H. ; Salleh, R. ; Moravejosharieh, A.
    Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on

    DOI: 10.1109/CIMSim.2011.62
    Publication Year: 2011 , Page(s): 308 - 311
    Cited by:  Papers (7)

    IEEE Conference Publications

    Wireless sensor networks (WSN) are generally set up for gathering records from insecure environment. Nearly all security protocols for WSN believe that the opponent can achieve entirely control over a sensor node by way of direct physical access. The appearance of sensor networks as one of the main technology in the future has posed various challenges to researchers. Wireless sensor networks are composed of large number of tiny sensor nodes, running separately, and in various cases, with none access to renewable energy resources. In addition, security being fundamental to the acceptance and employ of sensor networks for numerous applications, also different set of challenges in sensor networks are existed. In this paper we will focus on security of Wireless Sensor Network. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Channel bonding in cognitive radio wireless sensor networks

    Rehmani, M.H. ; Lohier, S. ; Rachedi, A.
    Mobile and Wireless Networking (iCOST), 2012 International Conference on Selected Topics in

    DOI: 10.1109/iCOST.2012.6271293
    Publication Year: 2012 , Page(s): 72 - 76
    Cited by:  Papers (1)

    IEEE Conference Publications

    Recently, wireless sensor networks are gaining a lot of attention due to the availability of various low cost sensor devices. For example, Wireless Multimedia Sensor Networks (WMSNs) have lot of new potential applications in different domains including, environmental monitoring, home automation, tracking, health care, just to name a few. Another example is the Body Area Networks (BANs), where different sensors are attached with the patient's body. However, these sensor networks also bring several challenges, such as they are resource constraint, requires application specific QoS requirements, high bandwidth demands, and resistance to interference. In this paper, we argue that wireless sensor nodes with cognitive radio capability, together with channel bonding, can help to address these challenges. In this perspective, we discuss cognitive radio wireless sensor network for hospital environment as a case study. We then discuss the way of spectrum characterization and criteria for channel bonding in such networks. Finally, we highlight issues and challenges, which provides the basis to develop algorithms and protocols for the future cognitive radio wireless sensor network deployments in different application scenarios. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A preliminary study on lifetime maximization in clustered wireless sensor networks with energy harvesting nodes

    Pengfei Zhang ; Gaoxi Xiao ; Tan, H.
    Information, Communications and Signal Processing (ICICS) 2011 8th International Conference on

    DOI: 10.1109/ICICS.2011.6174242
    Publication Year: 2011 , Page(s): 1 - 5
    Cited by:  Papers (4)

    IEEE Conference Publications

    Clustering is used extensively in wireless sensor networks to optimize lifetime. Within clustering, the optimization of cluster head (CH) location is critical since CHs consume energy faster and have greater influence on lifetime than non cluster head (NCH) sensors. Energy harvesting wireless sensor networks (EH-WSNs) use energy harvesting devices to harvest energy from environment. In contrast with the traditional battery powered wireless sensor networks, EH-WSNs have extended network lifetime substantially. In this paper, we present a single cluster algorithm for lifetime optimization in homogeneous wireless sensor networks with one solar powered sensor. The proposed method could determine the optimal CH location within a given network distribution. We include the solar powered sensor node as relay node for CH and determine the optimal position for it. We evaluate the performance of our method through theoretical analysis as well as simulation. We found through the use of our method, the overall network lifetime could be optimized. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes

    Xuhui Chen ; Peiqiang Yu
    Biomedical Engineering and Informatics (BMEI), 2010 3rd International Conference on

    Volume: 7
    DOI: 10.1109/BMEI.2010.5639549
    Publication Year: 2010 , Page(s): 2863 - 2867
    Cited by:  Papers (1)

    IEEE Conference Publications

    In traditional wireless sensor networks, the users, the sink nodes and sensor nodes are considered to be static, and networks are organized by the form of single-layer planar, which can not adapt to the application of the sensor nodes with mobility. This article starts from the network architecture, introduces the architecture of traditional wireless sensor network, and takes account of the application scenario of mobile sensor nodes. Then we propose architecture of wireless sensor network with mobile sensor nodes. The architecture is divided into high-end node layer and low-end node layer. The high-end nodes are responsible for the data routing, and the low-end nodes are responsible for sensing and reporting data so that the mobile sensor nodes can be freed from the complicated routing calculation and implementation, and improve the network performance effectively. The simulation results show that the hierarchical mobile wireless sensor network can effectively reduce the energy consumption of sensor nodes and data transmission delay. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Trusted architecture for farmland wireless sensor networks

    Zhou Quan ; Fu Gui ; Deqin Xiao ; Yi Tang
    Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on

    DOI: 10.1109/CloudCom.2012.6427496
    Publication Year: 2012 , Page(s): 782 - 787
    Cited by:  Papers (1)

    IEEE Conference Publications

    Wireless sensor networks (WSNS) is an important part of the perception layer for the Internet of Things (IoT). It is one of the basic tools of collecting data for the Internet of Things. Trusted architecture is key for trusted transmission in the wireless sensor networks and applying support of the Internet of Things. In the paper, the wireless sensor networks is studied for the Internet of Things in the farmland. Based on wireless sensor network architecture, the trusted architecture for farmland wireless sensor networks is designed. The control flow of trusted architecture is discussed in detail. Additionally the trusted protocol model and the implement frame and phases are presented detailed. And the experimental data records show the trusted architecture for farmland wireless sensor networks can afford trusted and reliable data transmission for wireless sensor networks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Comparison of several sensor deployments in wireless sensor networks

    Xueqing Wang ; Shuxue Zhang
    E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on

    Volume: 1
    DOI: 10.1109/EDT.2010.5496594
    Publication Year: 2010 , Page(s): 236 - 239
    Cited by:  Papers (1)

    IEEE Conference Publications

    In wireless sensor networks, the number of sensor nodes has direct relation to the cost of total wireless sensor networks, and at the same time, the problem is closely connected to wireless sensor networks' performance, such as robust, fault-tolerance, and furthermore, it is considered at first as wireless sensor networks are designed. Therefore, the research on the number of sensor nodes has significant meanings of theory and practice to design of wireless sensor networks. By computation and analysis, the sensor deployments in the form of equilateral triangle, as a rule, are better than those in the form of square, and the efficient coverage area ratios decrease with increasing number of sensor nodes. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    REAR: Reliable Energy Aware Routing Protocol for Wireless Sensor Networks

    Kee-Young Shin ; JunKeun Song ; JinWon Kim ; Misun Yu ; Pyeong Soo Mah
    Advanced Communication Technology, The 9th International Conference on

    Volume: 1
    DOI: 10.1109/ICACT.2007.358410
    Publication Year: 2007 , Page(s): 525 - 530
    Cited by:  Papers (6)

    IEEE Conference Publications

    In wireless sensor networks, micro sensor nodes dispersed in real environmental field have a constraint energy capacity, so energy-efficient mechanism for wireless communication on each sensor node is so crucial. Specially, the jobs sending and processing sensing data information from on sensor node to the others are more majority parts than merely sensing some events. Thus, energy-efficient routing protocol in wireless sensor networks is necessary for increasing the network lifetime and is also influenced by many challenging factors in terms of energy, processing, and storage capacities. In this paper, we designed and implemented a reliable energy aware routing (REAR) protocol for wireless sensor networks and evaluated the performance of REAR by comparing with existing routing protocols. REAR considers residual energy capacity of each sensor node in establishing routing paths and supports multi-path routing protocol for reliable data transmission. Furthermore, REAR allows each sensor node to confirm success of data transmission to other sensor nodes by supporting the DATA-ACK oriented packet transmission. Finally, the performance evaluation results show that REAR provides energy-efficiency and reliability related to wireless communication in wireless sensor networks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A study on sensor nodes attestation protocol in a Wireless Sensor Network

    Yong-Sik Choi ; Young-Jun Jeon ; Sang-Hyun Park
    Advanced Communication Technology (ICACT), 2010 The 12th International Conference on

    Volume: 1
    Publication Year: 2010 , Page(s): 574 - 579
    Cited by:  Papers (5)

    IEEE Conference Publications

    A sensor network is applied to various fields from the special application fields such as wild environment monitoring, industrial machine measurement, and military-purpose measurement to the daily application fields such as fire monitoring and pollution monitoring. A Wireless Sensor Network is a wire and wireless network, which consists of several sensor nodes deployed in a certain field. A sensor node should have computation, sensing and wireless communication functions. A sensor network has a limited computing and communication resource. To overcome this barrier, collaboration with surrounding nodes is required. In other words, information sharing between hierarchies is required rather than a hierarchical approach. A sensor network generally consists of a large number of sensor nodes for exact sensing and extendibility of the sensing areas. Therefore, attackers can easily capture sensor nodes. And an attacker is able to attack the sensor node itself and the sensor network through a modified attack on sensor nodes. Therefore, the security of a sensor network is important. The attestation for sensor nodes suggested by this paper consists of 2 steps. STEP 1. Inter-connective attestation between surrounding sensor nodes STEP 2. If there is any abnormality, the node notifies the BS (Base Station) and requests attestation as to whether there is a damaged node or not. Initial sensor node attestation is carried out by inter-connective sensor nodes, not by the BS. If there is any abnormality, the node notifies the BS. And BS carries out attestation for node showing abnormality. Attestation for the BS and sensor node uses an authentication protocol method for preventing nodes from being captured. As mentioned above, because there is a periodic simple attestation procedure between sensor nodes and sensor node attestation, it is easy and rapid to identify which is captured by attacker; thus, a secure sensor network is attainable. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Intermittent wireless multihop transmission protocol in mobile wireless sensor networks

    Kumagai, S. ; Higaki, H.
    Signal Processing and Communication Systems (ICSPCS), 2014 8th International Conference on

    DOI: 10.1109/ICSPCS.2014.7021094
    Publication Year: 2014 , Page(s): 1 - 8

    IEEE Conference Publications

    A sensor network is one of the most expected Internet applications. Here, wireless multihop transmissions of sensor data messages are applied to reach them the nearest stationary sink node connected to the Internet. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies supporting such dynamic wireless multihop networks are required to be developed. A location based message-by-message routing protocol such as GEDIR is suitable for dynamic wireless networks; however, it is required for each mobile wireless sensor node to achieve the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach with help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the message. Simulation experiments show that the proposed probabilistic method achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Image transmission method in wireless camera-based sensor networks by using variable interleaving approach

    Navin, A.H. ; Asadi, B. ; Navadad, Z. ; Mirnia, M.
    Computer Design and Applications (ICCDA), 2010 International Conference on

    Volume: 2
    DOI: 10.1109/ICCDA.2010.5541289
    Publication Year: 2010 , Page(s): V2-610 - V2-612

    IEEE Conference Publications

    The Wireless Multimedia Sensor Network is a distributed sensor network consisting of a group of multimedia sensor nodes that have the capabilities of computing, storage and communication. The multimedia sensors nodes sense environment multimedia information first and send them to the central processing node like sink or human. The availability of low-cost hardware such as cameras has fostered the development of wireless camera-based sensor networks, networks of wirelessly interconnected devices that are able to capture video streams, still images from environment. Image sensor nodes suffer problems such as heavy data traffic, limited energy and computation capability. In wireless camera-based sensor networks, energy consumption of nodes is used to image transmission and processing, so it is one of the considerable challenges in these networks. This paper, proposes a new approach to reduce energy consumption along with increasing networks lifetime. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Design of energy-efficient wireless sensor networks with censoring, on-off, and censoring and on-off sensors based on mutual information

    Yamasaki, K. ; Ohtsuki, T.
    Vehicular Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st

    Volume: 2
    DOI: 10.1109/VETECS.2005.1543521
    Publication Year: 2005 , Page(s): 1312 - 1316 Vol. 2
    Cited by:  Papers (9)

    IEEE Conference Publications

    In wireless sensor networks, owing to the limitation of energy, memory, and computation, it is necessary to construct the networks under the constraints. To save the energy, the censoring sensor that transmits information of its observations only when it is informative was proposed, and the optimal censoring region was derived so that the detection probability was maximized. The on-off sensor that is either awake or asleep (on or off) is also effective to save the observation energy. The collaboration of censoring and sleeping plays a great role in saving more energy. In this paper, we derive the mutual information in a wireless sensor network with i) censoring sensors, ii) on-off sensors, and iii) censoring and on-off sensors. Under the constraint on the average cost of each sensor, we also derive the optimum censoring and sleeping probabilities with respect to the mutual information in the sensor networks. Using the mutual information, we show that the largest mutual information in the sensor network with censoring and on-off sensors can always be achieved. We also show that the mutual information in the sensor networks with on-off sensors and with censoring and on-off sensors are larger than that in the sensor network with censoring sensors when the average cost of each sensor is small and the observation cost is large. Furthermore, we show that the largest mutual information in the sensor networks with censoring and on-off sensors and with censoring sensors can be obtained when the average cost of each sensor is not small and the observation cost is small. Based on the results, we can design very energy-efficient wireless sensor networks by using censoring and on-off sensors. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Wireless sensor network denial of sleep attack

    Brownfield, M. ; Yatharth Gupta ; Davis, N.
    Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC

    DOI: 10.1109/IAW.2005.1495974
    Publication Year: 2005 , Page(s): 356 - 364
    Cited by:  Papers (10)  |  Patents (1)

    IEEE Conference Publications

    With the progression of computer networks extending boundaries and joining distant locations, wireless sensor networks (WSN) emerge as the new frontier in developing opportunities to collect and process data from remote locations. Like IEEE 802.3 wired and IEEE 802.11 wireless networks, remote wireless sensor networks are vulnerable to malicious attacks. While wired and infrastructure-based wireless networks have mature intrusion detection systems and sophisticated firewalls to block these attacks, wireless sensor networks have only primitive defenses. WSNs rely on hardware simplicity to make sensor field deployments both affordable and long-lasting without any maintenance support. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network lifetime. Denying sleep effectively attacks each sensor node's critical energy resources and rapidly drains the network's lifetime. This paper analyzes the energy resource vulnerabilities of wireless sensor networks, models the network lifetimes of leading WSN medium access control (MAC) protocols, and proposes a new MAC protocol which mitigates many of the effects of denial of sleep attacks. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A study on the vehicular wireless base-station for in-vehicle wireless sensor network system

    Doo Seop Yun ; Seung-Jun Lee ; Do Hyun Kim
    Information and Communication Technology Convergence (ICTC), 2014 International Conference on

    DOI: 10.1109/ICTC.2014.6983225
    Publication Year: 2014 , Page(s): 609 - 610

    IEEE Conference Publications

    In this paper, we study on the vehicular wireless basestation for in-vehicle wireless sensor network system. We introduce in-vehicle wireless sensor network system applying wireless sensor network technologies. The in-vehicle wireless sensor network system greatly consists of the vehicular wireless base-station, vehicular wireless sensor nodes, and wireless OBD (On-Board Diagnostics) module. Here, we describe the vehicular wireless base-station as sub-system of in-vehicle wireless sensor network system. The vehicular wireless base-station carries out roles which process ECU (Electronics Control Unit) information obtained from wireless OBD module and sensor information received from a number of vehicular wireless sensor nodes. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Solving the hidden and exposed terminal problems using directional-antenna based MAC protocol for wireless sensor networks

    Adere, K. ; Murthy, G.R.
    Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On

    DOI: 10.1109/WOCN.2010.5587352
    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (1)

    IEEE Conference Publications

    A critical design issue for wireless sensor networks (WSNs) is the development of medium access control (MAC) protocols that efficiently reduce power consumption. WSNs sensor nodes are generally powered by batteries which provide a limited amount of energy, and it is often difficult to recharge or replace batteries. Therefore power aware and energy efficient MAC protocols at each layer of the communications are very essential for wireless sensor networks. Fairness to both the usage of a channel and messages may also be traded as for improved power consumptions. In case of classical antennas, unfair channel allocation and wastage of channels between each node can be happened, which is directly affects throughput performance. On the other hand these can bring a problem such as MAC-deadlock, hidden and exposed terminal problem. To overcome these problems a directional antennas have been extensively used in designing MAC protocols for wireless sensor networks. Directional antennas provide many advantages over the classical antennas. These advantages include spatial reuse channel and increases in coverage range distance. One of the main considerations in designing MAC protocols for static wireless sensor networks is to reduce power consumption at the sensor nodes. This is usually done by imposing transmission and receiving schedules on the sensor nodes from only one side at same time. Since it is desirable for a sensor network to be self managed, these schedules need to be worked out by individual nodes in a distributed fashion. In this paper, we show that directional antennas can be used effectively to solve a common hidden and exposed terminal problem by using an energy efficient MAC protocol for wireless sensor networks. This directional Antenna could be rotated in case of base station node to avoid directional hidden terminal problem. Our MAC protocol conserves energy at the nodes by calculating a scheduling strategy at individual nodes and by avoiding packet collisi- - ons almost completely. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A reliable synchronous transport protocol for wireless image sensor networks

    Boukerche, A. ; Yan Du ; Jing Feng ; Pazzi, R.
    Computers and Communications, 2008. ISCC 2008. IEEE Symposium on

    DOI: 10.1109/ISCC.2008.4625679
    Publication Year: 2008 , Page(s): 1083 - 1089
    Cited by:  Papers (4)

    IEEE Conference Publications

    Recent advances in image sensing hardware have enabled the development of wireless image sensor networks. Similar to generic wireless sensor networks that collect information from surrounding physical environments as scalar variables, wireless image sensor networks can collect data to generate descriptions of interested targets as images or video streams that, in turn, enhance the userpsilas understanding. However, relaying images over wireless image sensor networks with certain QoS requirements is a challenging task due to the characteristics of wireless channels. In this paper, a novel transport protocol for wireless image sensor networks is presented. This protocol aims at the reliable and synchronous transmission of images from multiple sensor nodes to a sync point. The semantics of JPEG stream are exploited in order to improve the performance of the proposed protocol. We have conducted a series of simulation experiments and reported on their results. Our simulation results show that the proposed protocol performs well in error-prone wireless channels even under high packet loss rates. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Energy efficient transport protocol for wireless sensor networks

    Ganesh, S. ; Amutha, R.
    Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on

    DOI: 10.1109/ICCSIT.2009.5234908
    Publication Year: 2009 , Page(s): 464 - 468
    Cited by:  Papers (1)

    IEEE Conference Publications

    Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. Many applications of wireless sensor networks are useful only when connected to an external network. Previous research on transport layer protocols for sensor networks has focused on designing protocols specifically targeted for sensor networks. The deployment of TCP/IP in sensor networks would, however, enable direct connection between the sensor network and external TCP/IP networks. In this paper we focus on the performance of TCP in the context of wireless sensor networks. TCP is known to exhibit poor performance in wireless environments, both in terms of throughput and energy efficiency. To overcome these problems we introduce a mechanism called TCP segment caching .We show by simulation that TCP segment caching significantly improves TCP performance so that TCP can be useful even in wireless sensor networks. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.